Search alternatives:
correction algorithm » detection algorithm (Expand Search), compression algorithms (Expand Search), detection algorithms (Expand Search)
selection algorithm » detection algorithm (Expand Search), detection algorithms (Expand Search), prediction algorithms (Expand Search)
correction algorithm » detection algorithm (Expand Search), compression algorithms (Expand Search), detection algorithms (Expand Search)
selection algorithm » detection algorithm (Expand Search), detection algorithms (Expand Search), prediction algorithms (Expand Search)
-
1
-
2
Edge server registration phase.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
3
CorrEA: A Web Server for Optimizing Correlations between Calculated Energies and Activities in Ligand–Receptor Systems Considering Multiple Binding Site Conformations
Published 2025“…CorrEA performs a genetic algorithm (GA) selection to extract a representative complex for each ligand that better adjusts the global correlation between calculated docking energy values and experimental logarithmic biological activities. …”
-
4
PI3K-Seeker: A Machine Learning-Powered Web Tool to Discover PI3K Inhibitors
Published 2025“…In this study, we developed PI3K-Seeker, a web server based on a two-stage prediction process to find new PI3K inhibitors. …”
-
5
PI3K-Seeker: A Machine Learning-Powered Web Tool to Discover PI3K Inhibitors
Published 2025“…In this study, we developed PI3K-Seeker, a web server based on a two-stage prediction process to find new PI3K inhibitors. …”
-
6
PI3K-Seeker: A Machine Learning-Powered Web Tool to Discover PI3K Inhibitors
Published 2025“…In this study, we developed PI3K-Seeker, a web server based on a two-stage prediction process to find new PI3K inhibitors. …”
-
7
-
8
Network model.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
9
Comparative Analysis (Performance Metrics).
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
10
SN/IoT or user registration phase.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
11
Communication costs in bits.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
12
Communication costs.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
13
Mutual authentication phase.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
14
Notations used and their descriptions.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
15
Comparative Analysis (Security Functionalities).
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
16
Storage Cost of the Proposed Protocol.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
17
Comparison with existing work.
Published 2025“…<div><p>Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users are reluctant to share with intermediary services (i.e., Fog servers). …”
-
18
Registration phase.
Published 2025“…<div><p>Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users are reluctant to share with intermediary services (i.e., Fog servers). …”
-
19
Performance comparison of different ML models.
Published 2025“…<div><p>Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users are reluctant to share with intermediary services (i.e., Fog servers). …”
-
20
Classification Report for the proposed model.
Published 2025“…<div><p>Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users are reluctant to share with intermediary services (i.e., Fog servers). …”